Home | Amazing | Today | Tags | Publishers | Years | Search 
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with...

Calculus
Calculus
The calculus course is a critical course for science, technology, engineering, and math majors. This course sets the stage for many majors and is where students see the beauty of mathematics, encouraging them to take upper-level math courses.

In a calculus market-research study conducted in 2008, calculus faculty
...
System Design for Telecommunication Gateways
System Design for Telecommunication Gateways

System Design for Telecommunication Gateways provides a thorough review of designing telecommunication network equipment based on the latest hardware designs and software methods available on the market. Focusing on high-end efficient designs that challenge all aspects of the system architecture, this book helps readers to understand a...

Managing Risk and Information Security: Protect to Enable
Managing Risk and Information Security: Protect to Enable
Newly promoted CISOs rapidly realize that the scope of the position they have taken on is often beyond what they have been prepared for. The nature of securing an enterprise is daunting and overwhelming. There are no simple checklists or roadmaps for success. Many of the technical security skills a CISO has acquired during the early...
Content and Workflow Management for Library Websites: Case Studies
Content and Workflow Management for Library Websites: Case Studies

Using database-driven web pages or web content management (WCM) systems to manage increasingly diverse web content and to streamline workflows is a commonly practiced solution recognized in libraries to-day. However, limited library web content management models and funding constraints prevent many libraries from purchasing commercially...

New Directions of Modern Cryptography
New Directions of Modern Cryptography

Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern...

Microsoft Excel 2013 Inside Out
Microsoft Excel 2013 Inside Out

You’re beyond the basics—so dive in and really put your spreadsheet skills to work! This supremely organized reference is packed with hundreds of timesaving solutions, troubleshooting tips, and workarounds. It’s all muscle and no fluff. Learn how the experts tackle Excel 2013—and challenge yourself to new...

Flip the Funnel: How to Use Existing Customers to Gain New Ones
Flip the Funnel: How to Use Existing Customers to Gain New Ones

Why customer retention is the new acquisition

If there's anything the recession of 2009 taught us, it was the importance of investing in our customers, but when was this any different? So says Joseph Jaffe, bestselling author of Life After the 30-Second Spot and Join the Conversation, and a leading expert and...

Essentials of Probability & Statistics for Engineers & Scientists
Essentials of Probability & Statistics for Engineers & Scientists
This text was designed for a one-semester course that covers the essential topics needed for a fundamental understanding of basic statistics and its applications in the fields of...
The High-Velocity Edge: How Market Leaders Leverage Operational Excellence to Beat the Competition
The High-Velocity Edge: How Market Leaders Leverage Operational Excellence to Beat the Competition

Generate Better, Faster Results— Using Less Capital and Fewer Resources!

“[The High-Velocity Edge] contains ideas that form the basis for structured continuous learning and improvement in every aspect of our lives. While this book is tailored to business leaders, it should be read by high school seniors,...

Introduction to Reliable Distributed Programming
Introduction to Reliable Distributed Programming

In modern computing a program is usually distributed among several processes. The fundamental challenge when developing reliable distributed programs is to support the cooperation of processes required to execute a common task, even when some of these processes fail.

Guerraoui and Rodrigues present an introductory description of...

Y-Size Your Business: How Gen Y Employees Can Save You Money and Grow Your Business
Y-Size Your Business: How Gen Y Employees Can Save You Money and Grow Your Business

In today's economy, maximizing the performance of every employee is critical to business survival and growth. Gen Y—sometimes called Millennials—provides an enticing opportunity for employers to increase their short-term profitability and create a long-term competitive advantage. Almost 80 million strong, Gen Y is the fastest...

Result Page: 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy